US11323430B2 - Identity verification method and device and electronic device - Google Patents
Identity verification method and device and electronic device Download PDFInfo
- Publication number
- US11323430B2 US11323430B2 US16/892,902 US202016892902A US11323430B2 US 11323430 B2 US11323430 B2 US 11323430B2 US 202016892902 A US202016892902 A US 202016892902A US 11323430 B2 US11323430 B2 US 11323430B2
- Authority
- US
- United States
- Prior art keywords
- service
- service device
- server
- device identifier
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Definitions
- the application relates to the technical field of the Internet, and in particular, to a method, an apparatus, and an electronic device for identity verification.
- a user may use a mobile terminal device to open the smart lock.
- the smart lock needs to verify the identity of the user. Only after the identity verification is successful, can the mobile terminal device obtain a digital pass or a digital key to open the smart lock.
- a service device such as a smart lock needs to verify the identity of the user. It can be seen that, since the service device needs to perform identity verification, the service device needs to have some software and/or hardware requirements. For example, when face recognition is used to perform identity verification, the service device needs to have some computation capabilities in software and have a camera in hardware.
- Embodiments of the application provide a method, an apparatus, and a non-transitory computer-readable storage medium for identity verification.
- a method for identity verification is provided.
- the method may be applied on a mobile terminal device and comprise: obtaining, from a service device, a device identifier of the service device, wherein the service device is configured to provide a service based on a digital key; uploading the device identifier of the service device to a server that is in communication with the service device and the mobile terminal device and stores registration information of service devices, to cause the server to perform validity verification on the device identifier of the service device; in response to receiving a result of the validity verification from the server indicating the device identifier of the service device is valid, collecting identity feature information of a user that is to obtain the service from the service device; uploading the identity feature information of the user to the server, to cause the server to perform identity verification on the user based on the identity feature information; and obtaining the digital key issued by the server in response to the identity verification being successful, wherein the digital key is configured to be used by the user to obtain the service provided by the service device.
- obtaining, from a service device, a device identifier of the service device comprises: establishing short-range wireless communication with the service device to obtain the device identifier transmitted by the service device.
- the short-range wireless communication comprises Bluetooth communication, infrared communication, wireless local area network, WI-FI, Ultra-Wide Band communication, Zigbee communication, or near-field communication.
- obtaining, from a service device, a device identifier of the service device comprises: scanning a graphic code provided by the service device to obtain the device identifier of the service device.
- the identity feature information comprises biometric information.
- the biometric information comprises a fingerprint, a palmprint, an iris, an eyeprint, a face, a sound wave, a brain wave, or a combination thereof.
- the device identifier comprises a static device identifier and/or a dynamic device identifier.
- the dynamic device identifier comprises a dynamic token.
- an apparatus for identity verification may comprise: one or more processors and one or more non-transitory computer-readable memories coupled to the one or more processors and configured with instructions executable by the one or more processors to cause the apparatus to perform operations comprising: obtaining, from a service device, a device identifier of the service device, wherein the service device is configured to provide a service based on a digital key; uploading the device identifier of the service device to a server that is in communication with the service device and the mobile terminal device and stores registration information of service devices, to cause the server to perform validity verification on the device identifier of the service device; in response to receiving a result of the validity verification from the server indicating the device identifier of the service device is valid, collecting identity feature information of a user that is to obtain the service from the service device; uploading the identity feature information of the user to the server, to cause the server to perform identity verification on the user based on the identity feature information; and obtaining the digital
- a non-transitory computer-readable storage medium may be configured with instructions executable by one or more processors to cause the one or more processors to perform operations comprising: obtaining, from a service device, a device identifier of the service device, wherein the service device is configured to provide a service based on a digital key; uploading the device identifier of the service device to a server that is in communication with the service device and the mobile terminal device and stores registration information of service devices, to cause the server to perform validity verification on the device identifier of the service device; in response to receiving a result of the validity verification from the server indicating the device identifier of the service device is valid, collecting identity feature information of a user that is to obtain the service from the service device; uploading the identity feature information of the user to the server, to cause the server to perform identity verification on the user based on the identity feature information; and obtaining the digital key issued by the server in response to the
- identity verification that has been originally performed by a device is now performed by a server, which may lower software and hardware requirements of the device, and the embodiments may then also be applicable to a device that does not have high performance.
- FIG. 1 is a concept diagram of an architecture of a system for realizing identity verification according to some embodiments of the application
- FIG. 2 is a flow chart of a method for identity verification according to some embodiments of the application.
- FIG. 3 is a flow chart of another method for identity verification according to some embodiments of the application.
- FIG. 4 is a hardware structural diagram of a device for identity verification according to some embodiments of the application.
- FIG. 5 is a schematic diagram of modules of an apparatus for identity verification according to some embodiments of the application.
- first, second, third, etc. may be used in the application to describe various information, but the information shall not be limited to these terms. These terms are used to differentiate information of the same type from another. For example, without departing from the scope of the application, first information may also be referred to as second information, and similarly, second information may also be referred to as first information.
- first information may also be referred to as second information
- second information may also be referred to as first information.
- the term “if” used herein may be construed as “when . . . ” or “at the time of . . . ” or “in response to determining.”
- the devices need to meet some software and/or hardware requirements. For example, when face recognition is used to perform identity verification, the devices are required to have some computation capabilities in software and have a camera in hardware.
- the devices may be strict energy consumption requirements when the devices are designed, such as low power devices powered by batteries. These devices generally adopt low power modules, and thus cannot meet the demand for long-term complex computation. Taking smart locks as an example again, smart locks are generally powered by batteries, and low power modules are adopted to achieve long-term use. Therefore, current smart locks may not meet the computation capability requirements to perform the needed identity verification
- the application may involve one or more systems.
- FIG. 1 a concept diagram of an example architecture of a system applicable in the application is illustrated, and the concept diagram of the architecture of the system may comprise a device 11 that is able to provide a service based on a digital key (or pass) (the two terms are interchangeably used in the specification), a mobile terminal device 12 , and a server 13 .
- a digital key or pass
- the device 11 that is able to provide a service based on a digital pass or key may refer to a device for which a digital pass or a digital key is required.
- the device 11 may be various devices in various scenarios. For example, in the scenario of hotel check-in, the device 11 may be a self-service terminal device for check-in, and in the scenario of opening a lock, the device 11 may be a smart lock.
- the mobile terminal device 12 may refer to a client device used by a user and installed with an application.
- the mobile terminal device may be a mobile phone installed with an application (APP).
- APP application
- the digital key may also be referred to as a digital pass hereinafter.
- a digital key or digital pass may be code, a password, a Quick Response (QR) code, or an application (APP) operating on the mobile terminal device 11 to enable a user to obtain the service provided by the device 11 .
- a digital key or pass may be an APP operating on a mobile phone to open a smart lock.
- the server 13 may refer to an application server, a server cluster, or a cloud platform constructed based on a server cluster, in communication with the device 11 and the mobile terminal device 12 .
- the server 13 may implement identity verification.
- the server 13 is configured to verify identities of the users that are to obtain the service from the device 11 .
- the mobile terminal device 12 may obtain a device identifier of the device 11 .
- the mobile terminal device 12 may collect identity feature information of the user, which is to be verified by the server 13 , and send the identity feature information of the user to the server 13 .
- the mobile terminal device 12 may obtain a digital pass issued by the server 13 in response to identity of the user being verified successfully. Then, the mobile terminal device 12 may be used by the user to obtain the service provided by the device 11 based on the digital pass.
- Embodiments of a method for identity verification according to the application will be described below with reference to FIG. 2 .
- the method may comprise the following steps.
- a mobile terminal device obtains a device identifier of a service device for providing a service to a user based on a digital key, and uploads the obtained device identifier to the server.
- the service device may be referred to as the device in some occasions hereinafter for conciseness.
- the device identifier comprises a static device identifier and/or a dynamic device identifier.
- the device identifier is unique, i.e., each device may correspond to one unique device identifier, such as a device serial number, a device identification (ID), and the like when the device leaves the factory.
- a device serial number such as a device serial number
- ID device identification
- the device identifier may comprise a dynamic token.
- the dynamic token may refer to an encrypted character string, which may be generated by a preset algorithm.
- the dynamic token changes dynamically. For example, the dynamic token obtained by the mobile terminal device each time is different, or the device periodically generates a new token.
- the mobile terminal device obtaining a device identifier of a device comprises: the mobile terminal device obtaining, by establishing short-range wireless communication with the device, a device identifier transmitted by the device. For example, the mobile terminal device establishes short-range wireless communication with the device, and the device transmits its device identifier to the mobile terminal device.
- the short-range wireless communication comprises one of Bluetooth communication, infrared communication, wireless local area network, WI-FI, Ultra-Wide Band communication, Zigbee communication, and near-field communication.
- a module applicable for short-range wireless communication may be integrated in the device, for example, a Bluetooth module, an infrared (IrDA) module, a wireless local area network (WI-FI or WLAN, mostly adopting the 802.11-series protocols) module, a WI-FI Direct module, a Ultra-Wide Band module, a Zigbee module, and a near-field communication (NFC) module, so as to achieve short-range receiving and transmitting of wireless signals.
- the same module applicable for short-range wireless communication may also be integrated in the mobile terminal device.
- the Bluetooth technology is taken as an example for description.
- the Bluetooth technology can support point to point and point to multi-point communications, thereby achieving fast and convenient information exchange between devices.
- a device may transmit, via a Bluetooth module, a broadcasting signal containing its own identifier (e.g., Universally Unique Identifier (UUID)).
- UUID Universally Unique Identifier
- the Bluetooth module may be identified through the Universally Unique Identifier (UUID).
- UUID may be, for example, in a short form (16 or 32 bits) or a long form (128 bits).
- a UUID may be transmitted via a Bluetooth broadcasting signal.
- the Bluetooth Low Energy (BLE) technology may be adopted as the Bluetooth technology.
- the iBeacon technology may be adopted.
- the iBeacon technology is a technology developed based on BLE with characteristics of low cost, extensive expansion, and flexible customization.
- the iBeacon technology may enable a smart phone or other devices to execute corresponding commands within a sensing range of an iBeacon base station.
- a payment collection device may be an iBeacon base station.
- iBeacon has been provided on the OS for mobile devices (iOS7) released by Apple, Inc. in September 2013.
- Advertising is a one-way sending mechanism and one of the broadcasting modes.
- a device to be searched e.g., an iBeacon base station, a payment collection device
- a device to be searched may send a data packet at a time interval of 20 ms to 10 s.
- a battery is consumed faster when a shorter time interval is used, and it is faster to find the device.
- the data packet length is at most 47 bytes, which may include the following parts:
- preamble (1 byte for the preamble)
- a BLE device may operate in a single and non-connectable advertising mode (in this mode, all information is included in an advertising data packet); in addition, a BLE device may also operate in a connectable mode (i.e., the connecting mode).
- the device for providing a service based on a digital pass or key may operate in a single and non-connectable advertising mode. In this way, the device may send out its own device identifier in the advertising mode. For example, the device identifier of the device may be carried in the above-described PDU data packet.
- the mobile terminal device may find the UUID of the device for providing a service based on a digital pass or key by scanning Bluetooth signals being broadcast. For example, an application installed on the mobile terminal device may drive the mobile terminal device to scan wireless signals by calling a low level Application Programming Interface (API). Then, a wireless signal sent by the device, e.g., a Bluetooth signal sent in the advertising mode, may be scanned. Since the Bluetooth signal sent by the device includes its own device identifier information, e.g., a UUID, the mobile terminal device may find this UUID from the scanned Bluetooth broadcasting signal.
- API Application Programming Interface
- the mobile terminal device obtaining a device identifier of a device comprises: the mobile terminal device obtaining, by scanning a graphic code provided by the device, a device identifier of the device.
- the device may display a graphic code including a device identifier.
- a module for scanning graphic codes such as a camera, a code scanner, and the like, may be integrated in the mobile terminal device, so as to scan the graphic code to obtain the device identifier.
- the camera is taken as an example for description.
- the mobile terminal device may turn on the camera.
- the camera collects an image of the graphic code
- the device identifier included in the graphic code may be obtained through analysis by local analysis software on the mobile terminal device or a remote server.
- the graphic code may comprise a QR code, a barcode, and the like.
- Step 120 the server performs validity verification on the device identifier, and returns a result of the validity verification to the mobile terminal device.
- the server performing validity verification on the device identifier may comprise: determining whether the device corresponding to the device identifier has been registered on the server; in the situation where the device corresponding to the device identifier has been registered on the server, determining that the result of the verification is valid.
- the manufacturer of the device may complete the registration on the server when the device leaves the factory.
- the server may store a correspondence relationship between the device identifier and the device and also have a record of registration.
- the server may have the same algorithm as the algorithm on the device for generating a dynamic token. Through the algorithm, the server may verify whether a dynamic token uploaded by the mobile terminal device is correct. In the situation where the dynamic token is correct, the server determines that the result of the verification is valid.
- the server may return the result of the verification to the mobile terminal device.
- Step 130 in the situation where the received result of the verification returned by the server is valid, the mobile terminal device collects identity feature information of a user, and uploads the collected identity feature information to the server.
- the identity feature information may comprise biometric information of the user.
- the biometric information comprises a fingerprint, a palmprint, an iris, an eyeprint, a face, a sound wave, a brain wave, or a combination thereof.
- a module for collecting biometric information may be integrated in the mobile terminal device. For example, a user's face image may be collected through a camera, a user's fingerprint may be collected through a fingerprint module, a user's sound wave information may be collected through a sound wave module, and the like.
- the identity feature information may also comprise password information input by a user.
- Step 140 the server performs identity verification on the identity feature information, and in the situation where the verification is successful, issues a digital pass to the mobile terminal device, wherein the digital pass is used to obtain a service provided by the device.
- the server may store identity feature information pre-stored by the user. Upon receiving the identity feature information uploaded by the mobile terminal device, the server may compare the identity feature information with the pre-stored identity feature information. If the identity feature information is consistent with the pre-stored identity feature information, it indicates that the current user is the user himself or herself; otherwise, it indicates that the current user is not the user himself or herself.
- the server may issue a digital pass to the mobile terminal device.
- the digital pass may be approved by the device, and the mobile terminal device may use the digital pass to obtain a service provided by the device.
- the mobile terminal device may open the smart lock by using the digital pass.
- the mobile terminal device may complete check-in by using the digital pass.
- identity verification that has been originally performed by a device is now performed by a server, which may lower software and hardware requirements of the device and the embodiments may then also be applicable to a device that does not have high performance.
- a server which may lower software and hardware requirements of the device and the embodiments may then also be applicable to a device that does not have high performance.
- whether the current user is the user himself or herself may be determined through the identity verification, which prevents impersonation and improves the reliability.
- the mobile terminal device using the digital pass may be as follows.
- the mobile terminal device sends the digital pass to the device, which may, referring to Step 110 , be implemented based on short-range wireless communication.
- the device may locally perform validation on the digital pass and provide services after the validation is successful.
- the device may upload the digital pass to the server for the server to validate the digital pass, and the services may be provided when a result of the validation returned by the server is valid.
- Step 210 obtaining a device identifier of a device
- Step 220 uploading the device identifier to a server, to cause the server to perform validity verification on the device identifier;
- Step 230 in the situation where a received result of the verification returned by the server is valid, collecting identity feature information of a user;
- Step 240 uploading the identity feature information to the server, to cause the server to perform identity verification on the identity feature information;
- Step 250 obtaining a digital pass issued by the server when the identity verification is successful, wherein the digital pass is used to obtain a service provided by the device.
- the obtaining a device identifier of a device may comprise: obtaining, by establishing short-range wireless communication with the device, the device identifier transmitted by the device; or, obtaining, by scanning a graphic code provided by the device, the device identifier of the device.
- the short-range wireless communication comprises Bluetooth communication, infrared communication, wireless local area network, WI-FI, Ultra-Wide Band communication, Zigbee communication, or near-field communication.
- the identity feature information comprises biometric information.
- the biometric information comprises a fingerprint, a palmprint, an iris, an eyeprint, a face, a sound wave, a brain wave, or a combination thereof.
- the device identifier comprises a static device identifier and/or a dynamic device identifier.
- the dynamic device identifier comprises a dynamic token.
- the application further provides embodiments of an apparatus for identity verification.
- the apparatus embodiments may be implemented through software, hardware, or a combination of software and hardware.
- an apparatus in the sense of logic is formed by a processor of a device where the apparatus is located reading corresponding computer program instructions from a non-volatile storage into the memory.
- a hardware structure of a device where the apparatus for identity verification is located according to the application may, as shown in FIG. 4 , comprise a processor, a network interface, a memory, and a non-volatile storage.
- the device where the apparatus is located may further comprise other hardware according to the function of the identity verification, which will not be elaborated herein.
- FIG. 5 is a schematic diagram of modules of an apparatus for identity verification according to some embodiments of the application.
- the apparatus comprises: a first obtaining unit 310 configured to obtain a device identifier of a device; a first uploading unit 320 configured to upload the device identifier to a server, to cause the server to perform validity verification on the device identifier; a collecting unit 330 configured to collect, in the situation where a received result of the validity verification returned by the server is valid, identity feature information of a user; a second uploading unit 340 configured to upload the identity feature information to the server, to cause the server to perform identity verification on the identity feature information; and a second obtaining unit 350 configured to obtain a digital pass issued by the server when the identity verification is successful, wherein the digital pass is used to obtain a service provided by the device.
- the first obtaining unit 310 may comprise a first obtaining sub-unit configured to obtain, by establishing short-range wireless communication with the device, a device identifier transmitted by the device.
- the first obtaining unit 310 may comprise a second obtaining sub-unit configured to obtain, by scanning a graphic code provided by the device, a device identifier of the device.
- the short-range wireless communication comprises Bluetooth communication, infrared communication, wireless local area network, WI-FI, Ultra-Wide Band communication, Zigbee communication, or near-field communication.
- the identity feature information comprises biometric information.
- the biometric information comprises a fingerprint, a palmprint, an iris, an eyeprint, a face, a sound wave, a brain wave, or a combination thereof.
- the device identifier comprises a static device identifier and/or a dynamic device identifier.
- the dynamic device identifier comprises a dynamic token.
- the system, apparatus, module, or unit elaborated in the embodiments can, for example, be achieved by a computer chip or entity or by a product having a function.
- One implementation device is a computer, and examples of the computer can include a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and transmitting device, a game console, a tablet computer, a wearable device, or a combination of any of the above devices.
- the description of relevant parts of the method embodiments may be referenced for related parts of the apparatus embodiments.
- the above-described apparatus embodiments are merely examples, wherein the units described as separate parts may or may not be physically separated. Parts displayed as units may or may not be physical units, i.e., may be located at one place or may be distributed over a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the objectives of the application. One of ordinary skill in the art can understand and implement the embodiments of the application without creative effort.
- FIG. 5 schematically describes internal functional modules and structure of the apparatus for identity verification above, and the essential executing entity of the apparatus may be an electronic device, comprising: a processor; and a memory configured to store instructions executable by the processor, wherein the instructions, when executed by the processor, cause the device to perform the following operations: obtaining a device identifier of a device; uploading the device identifier to a server, to cause the server to perform validity verification on the device identifier; in the situation where a received result of the validity verification returned by the server is valid, collecting identity feature information of a user; uploading the identity feature information to the server, to cause the server to perform identity verification on the identity feature information; and obtaining a digital pass issued by the server when the identity verification is successful, wherein the digital pass is used to obtain a service provided by the device.
- the obtaining a device identifier of a device may, for example, comprise: obtaining, by establishing short-range wireless communication with the device, the device identifier transmitted by the device; or, obtaining, by scanning a graphic code provided by the device, the device identifier of the device.
- the short-range wireless communication comprises Bluetooth communication, infrared communication, wireless local area network, WI-FI, Ultra-Wide Band communication, Zigbee communication, or near-field communication.
- the identity feature information comprises biometric information.
- the biometric information comprises a fingerprint, a palmprint, an iris, an eyeprint, a face, a sound wave, a brain wave, or a combination thereof.
- the device identifier comprises a static device identifier and/or a dynamic device identifier.
- the dynamic device identifier comprises a dynamic token.
- the processor may be a Central Processing Unit (or CPU in short), or may be other general-purpose processors, digital signal processors (or DSP in short), Application Specific Integrated Circuits (or ASIC in short), and the like.
- the general-purpose processor may be a micro-processor, or the processor may be any conventional processor, while the above-described memory may be a read-only memory (or ROM in abbreviation), a random access memory (or RAM in short), a flash memory, a hard drive, or a solid-state drive. Steps of the methods disclosed in combination with the embodiments of the application may be directly embodied as being executed by a hardware processor or executed by a combination of hardware and software modules in the processor.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Power Engineering (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims (17)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810234267.5A CN108564688A (en) | 2018-03-21 | 2018-03-21 | The method and device and electronic equipment of authentication |
CN201810234267.5 | 2018-03-21 | ||
PCT/CN2019/074090 WO2019179253A1 (en) | 2018-03-21 | 2019-01-31 | Identity verification method and device and electronic device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/074090 Continuation WO2019179253A1 (en) | 2018-03-21 | 2019-01-31 | Identity verification method and device and electronic device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20200304490A1 US20200304490A1 (en) | 2020-09-24 |
US11323430B2 true US11323430B2 (en) | 2022-05-03 |
Family
ID=63532981
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/892,902 Active US11323430B2 (en) | 2018-03-21 | 2020-06-04 | Identity verification method and device and electronic device |
Country Status (6)
Country | Link |
---|---|
US (1) | US11323430B2 (en) |
EP (1) | EP3716227B1 (en) |
CN (1) | CN108564688A (en) |
SG (1) | SG11202006204TA (en) |
TW (1) | TWI755580B (en) |
WO (1) | WO2019179253A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11528153B1 (en) * | 2022-05-27 | 2022-12-13 | Vouch.Io Llc | Systems and methods for delayed-message attack mitigation |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108564688A (en) * | 2018-03-21 | 2018-09-21 | 阿里巴巴集团控股有限公司 | The method and device and electronic equipment of authentication |
FI128637B (en) * | 2018-10-16 | 2020-09-15 | Telia Co Ab | Access to a service |
CN109379388B (en) * | 2018-12-17 | 2021-04-06 | 福建联迪商用设备有限公司 | Identity recognition method, terminal and wearable device |
CN109557682A (en) * | 2018-12-29 | 2019-04-02 | 四川九洲电器集团有限责任公司 | A kind of intelligence Zoom glasses |
CN111915305B (en) * | 2019-05-10 | 2023-07-25 | 腾讯科技(深圳)有限公司 | Payment method, device, equipment and storage medium |
CN110266657A (en) * | 2019-05-30 | 2019-09-20 | 浙江大华技术股份有限公司 | Authentication method and device, resource access method and device, storage medium |
CN112446995A (en) * | 2020-10-20 | 2021-03-05 | 支付宝(杭州)信息技术有限公司 | Identity information registration processing method, device, equipment and system |
EP4278577A1 (en) * | 2021-01-15 | 2023-11-22 | Assa Abloy AB | Use of qr codes in online encoding |
CN113360888A (en) * | 2021-06-07 | 2021-09-07 | 厦门熵基科技有限公司 | Identity authentication configuration method, system platform and terminal equipment |
CN114546115A (en) * | 2022-02-17 | 2022-05-27 | 北京脑陆科技有限公司 | Attendance management method, device and medium based on electroencephalogram signals |
CN114791834B (en) * | 2022-02-25 | 2024-04-26 | 数字广东网络建设有限公司 | Application program starting method and device, electronic equipment and storage medium |
CN116938501A (en) * | 2022-04-12 | 2023-10-24 | 腾讯科技(深圳)有限公司 | Authentication method, device, storage medium, and program product |
CN118200035A (en) * | 2024-04-25 | 2024-06-14 | 北京锐客科技有限公司 | Method and system for secure communication |
CN118413324B (en) * | 2024-07-02 | 2024-10-18 | 国网江苏省电力有限公司信息通信分公司 | Method, device, equipment and medium for identifying entity of power network |
Citations (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09322246A (en) | 1996-05-28 | 1997-12-12 | Matsushita Electric Ind Co Ltd | Radio portable terminal equipment |
US5979754A (en) | 1995-09-07 | 1999-11-09 | Martin; Jay R. | Door lock control apparatus using paging communication |
US20040267946A1 (en) * | 2001-09-17 | 2004-12-30 | Paul Caplin | Server access control |
US20050221799A1 (en) * | 2004-03-30 | 2005-10-06 | Tervo Timo P | Smart terminal remote lock and format |
US20070206838A1 (en) | 2006-02-22 | 2007-09-06 | Fouquet Julie E | Time synchronous biometric authentication |
US20070214492A1 (en) * | 2006-03-07 | 2007-09-13 | Marvell International Ltd. | Personal lifestyle device |
US20090256676A1 (en) * | 2008-04-14 | 2009-10-15 | The Eastern Company | Smart lock system |
US20110291798A1 (en) | 2010-05-28 | 2011-12-01 | Suridx, Inc. | Wireless Encrypted Control of Physical Access Systems |
US20120169460A1 (en) | 2010-12-29 | 2012-07-05 | Sasken Communication Technologies Ltd. | Multiparty Controlled Remote Security Lock System |
US20130198836A1 (en) | 2012-01-31 | 2013-08-01 | Google Inc. | Facial Recognition Streamlined Login |
US20130342314A1 (en) * | 2012-06-22 | 2013-12-26 | Gun Chen | Smart lock structure and operating method thereof |
CN103888265A (en) | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN103971435A (en) | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
US20140297538A1 (en) * | 2012-04-18 | 2014-10-02 | Edgard Lobo Baptista Pereira | System and Method for Data and Identity Verification and Authentication |
US20140365373A1 (en) * | 2008-12-08 | 2014-12-11 | Ebay Inc. | Unified identity verification |
CN104424678A (en) | 2013-08-30 | 2015-03-18 | 聚龙股份有限公司 | Electronic password lock system and control method thereof |
US20150127712A1 (en) | 2012-09-21 | 2015-05-07 | Google Inc. | Handling security services visitor at a smart-home |
CN104753898A (en) | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Verification method, terminal and server |
US20150363989A1 (en) | 2013-07-26 | 2015-12-17 | Joseph Frank Scalisi | Remote identity verification of lodging guests |
US20160042581A1 (en) | 2014-08-06 | 2016-02-11 | Che-Ming KU | Control method for smart lock, a smart lock, and a lock system |
CN105553928A (en) | 2015-07-31 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Biological-feature-identification-based communication method, apparatus and system |
CN105635174A (en) * | 2016-02-03 | 2016-06-01 | 武汉天梯极客网络科技有限公司 | Intelligent device sharing method |
CN105654592A (en) | 2016-01-12 | 2016-06-08 | 中科院微电子研究所昆山分所 | Intelligent door lock system based on cloud technology and wireless technology |
US9396599B1 (en) * | 2015-05-29 | 2016-07-19 | Google Inc. | Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock |
US20160217637A1 (en) | 2015-01-28 | 2016-07-28 | Noke, Llc | Electronic padlocks and related methods |
US20160224776A1 (en) | 2015-02-03 | 2016-08-04 | Chon Hock LEOW | System and Method Identifying a User to an Associated Device |
CN105871874A (en) | 2016-04-27 | 2016-08-17 | 武汉市国扬科技有限公司 | Mobile Internet virtual key authorizing system and hardware door lock control method thereof |
CN105913132A (en) | 2016-05-09 | 2016-08-31 | 优住(北京)科技股份公司 | Hotel rapid accommodation system and method |
US20160260271A1 (en) * | 2015-03-03 | 2016-09-08 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices |
US20160300411A1 (en) | 2015-04-08 | 2016-10-13 | Thomas M. Isaacson | System and method for door unlocking using a payment account |
US20160330183A1 (en) * | 2014-11-13 | 2016-11-10 | Mcafee, Inc. | Conditional login promotion |
US20160368455A1 (en) * | 2014-02-07 | 2016-12-22 | Gwang Woo Kim | Electronic key device capable of wirelessly controlling lock system and transmitting control authentication of lock system, system therefor, and method therefor |
CN106296917A (en) | 2016-08-08 | 2017-01-04 | 浪潮电子信息产业股份有限公司 | A kind of unlocking system, method and cloud management platform |
US20170011573A1 (en) * | 2015-07-06 | 2017-01-12 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
CN106335572A (en) | 2016-08-31 | 2017-01-18 | 武汉大学 | Low-power-consumption Bluetooth intelligent bicycle lock and public bicycle system adopting bicycle lock under Internet of things technology based on time-space safety |
US20170053467A1 (en) * | 2015-07-06 | 2017-02-23 | Acsys Ip Holding Inc. | Systems and methods for secure lock systems with redundant access control |
US20170076082A1 (en) * | 2014-03-14 | 2017-03-16 | Yorid Pty Ltd | Identity Verification System and Method |
US20170111174A1 (en) * | 2015-10-15 | 2017-04-20 | Verizon Patent And Licensing Inc. | Application-based toll-free data service |
US20170116610A1 (en) * | 2011-11-07 | 2017-04-27 | Facebook, Inc. | Identity verification and authentication |
US20170118198A1 (en) * | 2014-06-04 | 2017-04-27 | Token One Pty., Ltd. | Identity verification |
CN106656952A (en) | 2016-09-21 | 2017-05-10 | 北京神州绿盟信息安全科技股份有限公司 | Authentication method, device and system for registration equipment |
US20170140136A1 (en) * | 2014-07-29 | 2017-05-18 | Vatoscan (Pty) Ltd | Identity verification |
US20170140141A1 (en) * | 2015-11-16 | 2017-05-18 | Personnus | System for identity verification |
US20170161976A1 (en) * | 2015-12-07 | 2017-06-08 | Utechzone Co., Ltd. | Identity verification method, apparatus and system and non-transitory computer readable medium thereof |
US20170161978A1 (en) * | 2015-12-07 | 2017-06-08 | Capital One Services, Llc | Electronic access control system |
US20170206400A1 (en) * | 2016-01-18 | 2017-07-20 | Utechzone Co., Ltd. | Identity verification and apparatus |
US20170243425A1 (en) * | 2015-07-06 | 2017-08-24 | Acsys Ip Holding Inc. | Systems and methods for secure lock systems with redundant access control |
US20170243455A1 (en) | 2013-03-15 | 2017-08-24 | August Home, Inc. | Door lock system with one or more virtual fences |
US20170250972A1 (en) * | 2016-02-29 | 2017-08-31 | Troy Jacob Ronda | Systems and methods for distributed identity verification |
CN107154115A (en) | 2017-05-04 | 2017-09-12 | 上海众启建筑装饰工程集团有限公司 | A kind of electric automobile rent method, apparatus and system |
US9762581B1 (en) | 2016-04-15 | 2017-09-12 | Striiv, Inc. | Multifactor authentication through wearable electronic device |
CN107151415A (en) | 2017-06-13 | 2017-09-12 | 张子光 | Engineering water blockoff phenolic resin injecting paste material and preparation method |
US20170279801A1 (en) * | 2016-03-28 | 2017-09-28 | Black Gold Coin, Inc. | Systems and methods for providing block chain-based multifactor personal identity verification |
US20170287247A1 (en) | 2014-08-20 | 2017-10-05 | Gate Labs Inc. | Access management and resource sharing platform based on biometric identity |
US9787673B2 (en) * | 2014-12-16 | 2017-10-10 | Amazon Technologies, Inc. | Computing device with integrated authentication token |
US20170295177A1 (en) * | 2015-05-21 | 2017-10-12 | Tencent Technology (Shenzhen) Company Limited | Identity verification method, terminal, and server |
US20170302663A1 (en) * | 2016-04-14 | 2017-10-19 | Cisco Technology, Inc. | BLOCK CHAIN BASED IoT DEVICE IDENTITY VERIFICATION AND ANOMALY DETECTION |
US20170300679A1 (en) * | 2016-04-19 | 2017-10-19 | ProctorU Inc. | Identity verification |
US20170330165A1 (en) * | 2016-05-10 | 2017-11-16 | Danal Inc. | Methods and systems for identity verification at self-service machines |
US20170339141A1 (en) * | 2016-05-20 | 2017-11-23 | Azurecoast, LLC | System and Method of Identity Verification |
CN107493561A (en) | 2017-08-07 | 2017-12-19 | 北京小米移动软件有限公司 | Shared equipment unlocking method, apparatus and system |
US9864852B2 (en) * | 2015-07-27 | 2018-01-09 | Amazon Technologies, Inc. | Approaches for providing multi-factor authentication credentials |
US20180013565A1 (en) * | 2016-07-05 | 2018-01-11 | Capital One Services, Llc | Systems and methods for secure remote identity verification |
US20180018452A1 (en) * | 2016-07-14 | 2018-01-18 | Darren Tien-Chi Lee | Non-contact identity verification device, non-contact identity verification system, and non-contact identity verification method |
US20180041518A1 (en) * | 2016-08-02 | 2018-02-08 | Capital One Services, Llc | Systems and methods for proximity identity verification |
US20180039819A1 (en) * | 2016-08-02 | 2018-02-08 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for identity verification |
US20180046789A1 (en) * | 2016-08-11 | 2018-02-15 | Motorola Mobility Llc | Biometric identity verification with location feasibility determination |
US20180053184A1 (en) * | 2016-08-21 | 2018-02-22 | Christine Casey | Method of identity verification during payment card processing |
US20180063119A1 (en) * | 2016-08-23 | 2018-03-01 | Gullicksen Brothers, LLC | Vault appliance for identity verification and secure dispatch of rights |
US20180068173A1 (en) * | 2016-09-02 | 2018-03-08 | VeriHelp, Inc. | Identity verification via validated facial recognition and graph database |
US9923927B1 (en) * | 2015-09-29 | 2018-03-20 | Amazon Technologies, Inc. | Methods and systems for enabling access control based on credential properties |
US9942222B1 (en) * | 2014-09-02 | 2018-04-10 | Amazon Technologies, Inc. | Authentication with wearable device |
US20180107816A1 (en) * | 2016-10-13 | 2018-04-19 | Alibaba Group Holding Limited | Virtual reality identity verification |
US9955349B1 (en) * | 2015-03-30 | 2018-04-24 | Amazon Technologies, Inc. | Triggering a request for an authentication |
US20180121919A1 (en) * | 2009-03-30 | 2018-05-03 | Yuh-Shen Song | Identity verification system |
US20180146363A1 (en) * | 2016-11-21 | 2018-05-24 | Beijing Xiaomi Mobile Software Co., Ltd. | Identity verification method and apparatus, and storage medium |
US20180150839A1 (en) * | 2016-11-30 | 2018-05-31 | Ncr Corporation | Identity verification systems and methods |
US20180165686A1 (en) * | 2016-12-09 | 2018-06-14 | Lexisnexis Risk Solutions Inc. | Systems and methods for identity verification |
US20180176021A1 (en) * | 2015-06-18 | 2018-06-21 | Andium Inc. | Identity verification of wireless beacons based on chain-of-trust |
US20180197547A1 (en) * | 2017-01-10 | 2018-07-12 | Fujitsu Limited | Identity verification method and apparatus based on voiceprint |
US20180205718A1 (en) * | 2015-06-30 | 2018-07-19 | United States Postal Service | System and method of providing identity verification services |
US10050787B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Authentication objects with attestation |
US10049202B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Strong authentication using authentication objects |
US10057227B1 (en) * | 2015-03-27 | 2018-08-21 | Amazon Technologies, Inc. | Determination of authentication mechanism |
US20180260522A1 (en) * | 2017-03-08 | 2018-09-13 | Grant A. Bitter | Identity verification by computational analysis of genomic dna |
US20180262471A1 (en) * | 2012-04-18 | 2018-09-13 | Edgard Lobo Baptista Pereira | Identity verification and authentication method and system |
CN108564688A (en) | 2018-03-21 | 2018-09-21 | 阿里巴巴集团控股有限公司 | The method and device and electronic equipment of authentication |
US20180351747A1 (en) * | 2017-05-30 | 2018-12-06 | Sap Se | Identity Verification Using Computer-Implemented Decentralized Ledger |
US20180359244A1 (en) * | 2017-06-09 | 2018-12-13 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US20190020476A1 (en) * | 2017-07-14 | 2019-01-17 | Symantec Corporation | User-directed identity verification over a network |
US20190066114A1 (en) | 2017-08-28 | 2019-02-28 | David Joseph Ross | System and method for purchasing using biometric authentication |
US20190068367A1 (en) * | 2017-08-28 | 2019-02-28 | International Business Machines Corporation | Identity verification using biometric data and non-invertible functions via a blockchain |
US20190114854A1 (en) * | 2016-03-31 | 2019-04-18 | Qingdao Goertek Technology Co., Ltd. | Unlocking method using sound password and a smart lock |
US20190190718A1 (en) * | 2017-12-19 | 2019-06-20 | Mastercard International Incorporated | Biometric identity verification systems, methods and programs for identity document applications and renewals |
US20190207975A1 (en) * | 2017-12-29 | 2019-07-04 | Paypal, Inc. | Passive and active identity verification for online communications |
US10356069B2 (en) * | 2014-06-26 | 2019-07-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
US20190363885A1 (en) * | 2017-10-25 | 2019-11-28 | Google Llc | Privacy-preserving Identity Verification |
US20190363886A1 (en) * | 2017-12-13 | 2019-11-28 | Google Llc | Mechanism For Achieving Mutual Identity Verification Via One-Way Application-Device Channels |
US20200048933A1 (en) * | 2016-10-26 | 2020-02-13 | Pingchuan LI | A wireless power smart door lock |
US20210097159A1 (en) * | 2017-07-25 | 2021-04-01 | Ping An Technology (Shenzhen) Co., Ltd. | Electronic device, method and system of identity verification and computer readable storage medium |
US20210097795A1 (en) * | 2017-12-19 | 2021-04-01 | HELLA GmbH & Co. KGaA | Method and system for decentralized digital authentication |
US20210144247A1 (en) * | 2017-06-28 | 2021-05-13 | Beijing Sankuai Online Technology Co., Ltd | Identity verification method and apparatus and electronic device |
-
2018
- 2018-03-21 CN CN201810234267.5A patent/CN108564688A/en active Pending
-
2019
- 2019-01-07 TW TW108100521A patent/TWI755580B/en active
- 2019-01-31 WO PCT/CN2019/074090 patent/WO2019179253A1/en unknown
- 2019-01-31 SG SG11202006204TA patent/SG11202006204TA/en unknown
- 2019-01-31 EP EP19771488.4A patent/EP3716227B1/en active Active
-
2020
- 2020-06-04 US US16/892,902 patent/US11323430B2/en active Active
Patent Citations (111)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5979754A (en) | 1995-09-07 | 1999-11-09 | Martin; Jay R. | Door lock control apparatus using paging communication |
JPH09322246A (en) | 1996-05-28 | 1997-12-12 | Matsushita Electric Ind Co Ltd | Radio portable terminal equipment |
JP3261394B2 (en) | 1996-05-28 | 2002-02-25 | 松下電器産業株式会社 | Wireless portable terminal device |
US20040267946A1 (en) * | 2001-09-17 | 2004-12-30 | Paul Caplin | Server access control |
US20050221799A1 (en) * | 2004-03-30 | 2005-10-06 | Tervo Timo P | Smart terminal remote lock and format |
US20070206838A1 (en) | 2006-02-22 | 2007-09-06 | Fouquet Julie E | Time synchronous biometric authentication |
US20070214492A1 (en) * | 2006-03-07 | 2007-09-13 | Marvell International Ltd. | Personal lifestyle device |
US20120313752A1 (en) * | 2008-04-14 | 2012-12-13 | The Eastern Company | Smart lock system |
US20090256676A1 (en) * | 2008-04-14 | 2009-10-15 | The Eastern Company | Smart lock system |
US20140365373A1 (en) * | 2008-12-08 | 2014-12-11 | Ebay Inc. | Unified identity verification |
US20180121919A1 (en) * | 2009-03-30 | 2018-05-03 | Yuh-Shen Song | Identity verification system |
US20110291798A1 (en) | 2010-05-28 | 2011-12-01 | Suridx, Inc. | Wireless Encrypted Control of Physical Access Systems |
US20120169460A1 (en) | 2010-12-29 | 2012-07-05 | Sasken Communication Technologies Ltd. | Multiparty Controlled Remote Security Lock System |
US20170116610A1 (en) * | 2011-11-07 | 2017-04-27 | Facebook, Inc. | Identity verification and authentication |
US20130198836A1 (en) | 2012-01-31 | 2013-08-01 | Google Inc. | Facial Recognition Streamlined Login |
US20140297538A1 (en) * | 2012-04-18 | 2014-10-02 | Edgard Lobo Baptista Pereira | System and Method for Data and Identity Verification and Authentication |
US20140304162A1 (en) * | 2012-04-18 | 2014-10-09 | Edgard Lobo Baptista Pereira | System and Method for Data and Identity Verification and Authentication |
US20180262471A1 (en) * | 2012-04-18 | 2018-09-13 | Edgard Lobo Baptista Pereira | Identity verification and authentication method and system |
US20130342314A1 (en) * | 2012-06-22 | 2013-12-26 | Gun Chen | Smart lock structure and operating method thereof |
US20150127712A1 (en) | 2012-09-21 | 2015-05-07 | Google Inc. | Handling security services visitor at a smart-home |
US20170243455A1 (en) | 2013-03-15 | 2017-08-24 | August Home, Inc. | Door lock system with one or more virtual fences |
US20150363989A1 (en) | 2013-07-26 | 2015-12-17 | Joseph Frank Scalisi | Remote identity verification of lodging guests |
CN104424678A (en) | 2013-08-30 | 2015-03-18 | 聚龙股份有限公司 | Electronic password lock system and control method thereof |
CN104753898A (en) | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Verification method, terminal and server |
US20160368455A1 (en) * | 2014-02-07 | 2016-12-22 | Gwang Woo Kim | Electronic key device capable of wirelessly controlling lock system and transmitting control authentication of lock system, system therefor, and method therefor |
US20170076082A1 (en) * | 2014-03-14 | 2017-03-16 | Yorid Pty Ltd | Identity Verification System and Method |
US10049202B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Strong authentication using authentication objects |
US10050787B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Authentication objects with attestation |
CN103888265A (en) | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN103971435A (en) | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
US20170118198A1 (en) * | 2014-06-04 | 2017-04-27 | Token One Pty., Ltd. | Identity verification |
US10356069B2 (en) * | 2014-06-26 | 2019-07-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
US20170140136A1 (en) * | 2014-07-29 | 2017-05-18 | Vatoscan (Pty) Ltd | Identity verification |
US20160042581A1 (en) | 2014-08-06 | 2016-02-11 | Che-Ming KU | Control method for smart lock, a smart lock, and a lock system |
US20170287247A1 (en) | 2014-08-20 | 2017-10-05 | Gate Labs Inc. | Access management and resource sharing platform based on biometric identity |
US9942222B1 (en) * | 2014-09-02 | 2018-04-10 | Amazon Technologies, Inc. | Authentication with wearable device |
US20160330183A1 (en) * | 2014-11-13 | 2016-11-10 | Mcafee, Inc. | Conditional login promotion |
US10135813B2 (en) * | 2014-12-16 | 2018-11-20 | Amazon Technologies, Inc. | Computing device with integrated authentication token |
US9787673B2 (en) * | 2014-12-16 | 2017-10-10 | Amazon Technologies, Inc. | Computing device with integrated authentication token |
US20160217637A1 (en) | 2015-01-28 | 2016-07-28 | Noke, Llc | Electronic padlocks and related methods |
US20160224776A1 (en) | 2015-02-03 | 2016-08-04 | Chon Hock LEOW | System and Method Identifying a User to an Associated Device |
US20160260271A1 (en) * | 2015-03-03 | 2016-09-08 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices |
US10057227B1 (en) * | 2015-03-27 | 2018-08-21 | Amazon Technologies, Inc. | Determination of authentication mechanism |
US9955349B1 (en) * | 2015-03-30 | 2018-04-24 | Amazon Technologies, Inc. | Triggering a request for an authentication |
US20160300411A1 (en) | 2015-04-08 | 2016-10-13 | Thomas M. Isaacson | System and method for door unlocking using a payment account |
US20170295177A1 (en) * | 2015-05-21 | 2017-10-12 | Tencent Technology (Shenzhen) Company Limited | Identity verification method, terminal, and server |
US20160350988A1 (en) * | 2015-05-29 | 2016-12-01 | Google Inc. | Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock |
US9396599B1 (en) * | 2015-05-29 | 2016-07-19 | Google Inc. | Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock |
US20180040182A1 (en) * | 2015-05-29 | 2018-02-08 | Google Llc | Systems and Methods for Anticipatory Locking and Unlocking of a Smart-Sensor Door Lock |
US20180176021A1 (en) * | 2015-06-18 | 2018-06-21 | Andium Inc. | Identity verification of wireless beacons based on chain-of-trust |
US20180205718A1 (en) * | 2015-06-30 | 2018-07-19 | United States Postal Service | System and method of providing identity verification services |
US20170243425A1 (en) * | 2015-07-06 | 2017-08-24 | Acsys Ip Holding Inc. | Systems and methods for secure lock systems with redundant access control |
US20180102009A1 (en) * | 2015-07-06 | 2018-04-12 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
US20170011573A1 (en) * | 2015-07-06 | 2017-01-12 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
US20170053467A1 (en) * | 2015-07-06 | 2017-02-23 | Acsys Ip Holding Inc. | Systems and methods for secure lock systems with redundant access control |
US9864852B2 (en) * | 2015-07-27 | 2018-01-09 | Amazon Technologies, Inc. | Approaches for providing multi-factor authentication credentials |
CN105553928A (en) | 2015-07-31 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Biological-feature-identification-based communication method, apparatus and system |
US9923927B1 (en) * | 2015-09-29 | 2018-03-20 | Amazon Technologies, Inc. | Methods and systems for enabling access control based on credential properties |
US20170111174A1 (en) * | 2015-10-15 | 2017-04-20 | Verizon Patent And Licensing Inc. | Application-based toll-free data service |
US20170140141A1 (en) * | 2015-11-16 | 2017-05-18 | Personnus | System for identity verification |
US20170161978A1 (en) * | 2015-12-07 | 2017-06-08 | Capital One Services, Llc | Electronic access control system |
US20170161976A1 (en) * | 2015-12-07 | 2017-06-08 | Utechzone Co., Ltd. | Identity verification method, apparatus and system and non-transitory computer readable medium thereof |
CN105654592A (en) | 2016-01-12 | 2016-06-08 | 中科院微电子研究所昆山分所 | Intelligent door lock system based on cloud technology and wireless technology |
US20170206400A1 (en) * | 2016-01-18 | 2017-07-20 | Utechzone Co., Ltd. | Identity verification and apparatus |
CN105635174A (en) * | 2016-02-03 | 2016-06-01 | 武汉天梯极客网络科技有限公司 | Intelligent device sharing method |
US20170250972A1 (en) * | 2016-02-29 | 2017-08-31 | Troy Jacob Ronda | Systems and methods for distributed identity verification |
US20170279801A1 (en) * | 2016-03-28 | 2017-09-28 | Black Gold Coin, Inc. | Systems and methods for providing block chain-based multifactor personal identity verification |
US20190114854A1 (en) * | 2016-03-31 | 2019-04-18 | Qingdao Goertek Technology Co., Ltd. | Unlocking method using sound password and a smart lock |
US20170302663A1 (en) * | 2016-04-14 | 2017-10-19 | Cisco Technology, Inc. | BLOCK CHAIN BASED IoT DEVICE IDENTITY VERIFICATION AND ANOMALY DETECTION |
US9762581B1 (en) | 2016-04-15 | 2017-09-12 | Striiv, Inc. | Multifactor authentication through wearable electronic device |
US20170300679A1 (en) * | 2016-04-19 | 2017-10-19 | ProctorU Inc. | Identity verification |
CN105871874A (en) | 2016-04-27 | 2016-08-17 | 武汉市国扬科技有限公司 | Mobile Internet virtual key authorizing system and hardware door lock control method thereof |
CN105913132A (en) | 2016-05-09 | 2016-08-31 | 优住(北京)科技股份公司 | Hotel rapid accommodation system and method |
US20170330165A1 (en) * | 2016-05-10 | 2017-11-16 | Danal Inc. | Methods and systems for identity verification at self-service machines |
US20170339141A1 (en) * | 2016-05-20 | 2017-11-23 | Azurecoast, LLC | System and Method of Identity Verification |
US20180183599A1 (en) * | 2016-07-05 | 2018-06-28 | Capital One Services, Llc | Systems and methods for secure remote identity verification |
US20180013565A1 (en) * | 2016-07-05 | 2018-01-11 | Capital One Services, Llc | Systems and methods for secure remote identity verification |
US20180018452A1 (en) * | 2016-07-14 | 2018-01-18 | Darren Tien-Chi Lee | Non-contact identity verification device, non-contact identity verification system, and non-contact identity verification method |
US20180039819A1 (en) * | 2016-08-02 | 2018-02-08 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for identity verification |
US20180041492A1 (en) * | 2016-08-02 | 2018-02-08 | Capital One Services, Llc | Systems and methods for proximity identity verification |
US20180041518A1 (en) * | 2016-08-02 | 2018-02-08 | Capital One Services, Llc | Systems and methods for proximity identity verification |
CN106296917A (en) | 2016-08-08 | 2017-01-04 | 浪潮电子信息产业股份有限公司 | A kind of unlocking system, method and cloud management platform |
US20180046789A1 (en) * | 2016-08-11 | 2018-02-15 | Motorola Mobility Llc | Biometric identity verification with location feasibility determination |
US20180053184A1 (en) * | 2016-08-21 | 2018-02-22 | Christine Casey | Method of identity verification during payment card processing |
US20180063119A1 (en) * | 2016-08-23 | 2018-03-01 | Gullicksen Brothers, LLC | Vault appliance for identity verification and secure dispatch of rights |
CN106335572A (en) | 2016-08-31 | 2017-01-18 | 武汉大学 | Low-power-consumption Bluetooth intelligent bicycle lock and public bicycle system adopting bicycle lock under Internet of things technology based on time-space safety |
US20180068173A1 (en) * | 2016-09-02 | 2018-03-08 | VeriHelp, Inc. | Identity verification via validated facial recognition and graph database |
CN106656952A (en) | 2016-09-21 | 2017-05-10 | 北京神州绿盟信息安全科技股份有限公司 | Authentication method, device and system for registration equipment |
US20180107816A1 (en) * | 2016-10-13 | 2018-04-19 | Alibaba Group Holding Limited | Virtual reality identity verification |
US20200048933A1 (en) * | 2016-10-26 | 2020-02-13 | Pingchuan LI | A wireless power smart door lock |
US20180146363A1 (en) * | 2016-11-21 | 2018-05-24 | Beijing Xiaomi Mobile Software Co., Ltd. | Identity verification method and apparatus, and storage medium |
US20180150839A1 (en) * | 2016-11-30 | 2018-05-31 | Ncr Corporation | Identity verification systems and methods |
US20180165686A1 (en) * | 2016-12-09 | 2018-06-14 | Lexisnexis Risk Solutions Inc. | Systems and methods for identity verification |
US20180197547A1 (en) * | 2017-01-10 | 2018-07-12 | Fujitsu Limited | Identity verification method and apparatus based on voiceprint |
US20180260522A1 (en) * | 2017-03-08 | 2018-09-13 | Grant A. Bitter | Identity verification by computational analysis of genomic dna |
CN107154115A (en) | 2017-05-04 | 2017-09-12 | 上海众启建筑装饰工程集团有限公司 | A kind of electric automobile rent method, apparatus and system |
US20180351747A1 (en) * | 2017-05-30 | 2018-12-06 | Sap Se | Identity Verification Using Computer-Implemented Decentralized Ledger |
US20180359244A1 (en) * | 2017-06-09 | 2018-12-13 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
CN107151415A (en) | 2017-06-13 | 2017-09-12 | 张子光 | Engineering water blockoff phenolic resin injecting paste material and preparation method |
US20210144247A1 (en) * | 2017-06-28 | 2021-05-13 | Beijing Sankuai Online Technology Co., Ltd | Identity verification method and apparatus and electronic device |
US20190020476A1 (en) * | 2017-07-14 | 2019-01-17 | Symantec Corporation | User-directed identity verification over a network |
US20210097159A1 (en) * | 2017-07-25 | 2021-04-01 | Ping An Technology (Shenzhen) Co., Ltd. | Electronic device, method and system of identity verification and computer readable storage medium |
CN107493561A (en) | 2017-08-07 | 2017-12-19 | 北京小米移动软件有限公司 | Shared equipment unlocking method, apparatus and system |
US20190066114A1 (en) | 2017-08-28 | 2019-02-28 | David Joseph Ross | System and method for purchasing using biometric authentication |
US20190068367A1 (en) * | 2017-08-28 | 2019-02-28 | International Business Machines Corporation | Identity verification using biometric data and non-invertible functions via a blockchain |
US20190363885A1 (en) * | 2017-10-25 | 2019-11-28 | Google Llc | Privacy-preserving Identity Verification |
US20190363886A1 (en) * | 2017-12-13 | 2019-11-28 | Google Llc | Mechanism For Achieving Mutual Identity Verification Via One-Way Application-Device Channels |
US20190190718A1 (en) * | 2017-12-19 | 2019-06-20 | Mastercard International Incorporated | Biometric identity verification systems, methods and programs for identity document applications and renewals |
US20210097795A1 (en) * | 2017-12-19 | 2021-04-01 | HELLA GmbH & Co. KGaA | Method and system for decentralized digital authentication |
US20190207975A1 (en) * | 2017-12-29 | 2019-07-04 | Paypal, Inc. | Passive and active identity verification for online communications |
CN108564688A (en) | 2018-03-21 | 2018-09-21 | 阿里巴巴集团控股有限公司 | The method and device and electronic equipment of authentication |
Non-Patent Citations (16)
Title |
---|
Abbie Barbir Aetna USA, Updated text for X.dlt-sec, "Security considerations for using DLT data in Identity Mangement; C-0471", ITU-T DRAFT; International Telecommunication Union, Jan. 3, 2019. |
First Search and First Office Action for CN Application No. 201810234267.5 dated Feb. 5, 2020 (13 pages). |
Fuller et al ("Security Analysis of the August Smart Lock," Massachusetts Institute of Technology, May 24, 2017, pp. 1-17) (Year: 2017). * |
Google Patents Translation of CN 105635174 (Year: 2016). * |
Google Translation of CN105635174 (Year: 2016). * |
International Search Report and Written Opinion for Application No. PCT/CN2019/074090, dated Apr. 28, 2019, 10 pages. |
Othman Asem et al., "The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity," 2018 IJCNN, IEEE, Jul. 13, 2018. |
Paci et al "An Interoperable Approach to Multifactor Identity Verification," Cerias and CS Department Purdue University, IEEE Computer Society, pp. 50-57, May 2009 (Year: 2009). * |
Search Report for European Application No. 19 771 488.4 dated Oct. 20, 2020. |
Search Report for European Application No. 19771488.4 dated Nov. 24, 2020. |
Search Report for TW Application No. 108100521 dated Jun. 11, 2020 (2 pages). |
Secure Technology Alliance "Mobile Identity Authentication," A Secure Technology Alliance Mobile Councel White Paper, Version 1.0, Mar. 2017, pp. 1-39 (Year: 2017). * |
Supplemental Search Report and Second office action for CN Application No. 201810234267.5 dated May 7, 2020 (12 pages). |
Supplementary Search for Chinese Application No. 201810234267.5 dated Apr. 6, 2021. |
Third Office Action for CN Application No. 201810234267.5 dated Jul. 20, 2020 (10 pages). |
Written Opinion for Singaporean Application No. 11202006204T dated Jul. 27, 2021. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11528153B1 (en) * | 2022-05-27 | 2022-12-13 | Vouch.Io Llc | Systems and methods for delayed-message attack mitigation |
Also Published As
Publication number | Publication date |
---|---|
TW201941092A (en) | 2019-10-16 |
EP3716227A1 (en) | 2020-09-30 |
SG11202006204TA (en) | 2020-07-29 |
EP3716227A4 (en) | 2020-12-23 |
EP3716227B1 (en) | 2022-03-30 |
TWI755580B (en) | 2022-02-21 |
CN108564688A (en) | 2018-09-21 |
WO2019179253A1 (en) | 2019-09-26 |
US20200304490A1 (en) | 2020-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323430B2 (en) | Identity verification method and device and electronic device | |
US20220330029A1 (en) | Method for mutual recognition or mutual trust between bluetooth devices | |
US10728244B2 (en) | Method and system for credential management | |
KR100992573B1 (en) | Authentication method and system using mobile terminal | |
US9183683B2 (en) | Method and system for access to secure resources | |
US9578022B2 (en) | Multi-factor authentication techniques | |
US10078125B2 (en) | Beacon security | |
CN105847253B (en) | Method and apparatus for certification | |
CN104504767A (en) | Check-in information verification method and system | |
CN109039990B (en) | Behavior verification method and device based on verification code | |
CN104156651A (en) | Access control method and device for terminal | |
CN102802156B (en) | A kind of method for authenticating and relevant device | |
KR102559827B1 (en) | System for authenticating image based on blockchain and hash encryption technique and method thereof | |
CN102833074A (en) | Authentication method and related equipment | |
CN110910524A (en) | Automatic sign-in system, method, device, electronic equipment and computer storage medium | |
CN110958234B (en) | Application login control method and device and storage medium | |
KR101297166B1 (en) | Method and System for Providing User Authorization Service Using Bio Information and Mobile Communication Terminal for Transmitting Authorization Information Using Bio Information | |
WO2021138217A1 (en) | Method, chip, device and system for authenticating a set of at least two users | |
US20160316371A1 (en) | Location-based access control methods, cloud server, and client terminal utilizing the same | |
CN111511043B (en) | Network connection method, device, electronic equipment and storage medium | |
US9477827B1 (en) | Apparatus, system and method for authenticating a plurality of users for a mobile device using biometric means | |
KR101915732B1 (en) | Attendance check system and method using bluetooth and fingerprint sensor of smart device | |
KR101737382B1 (en) | Service providing method for easy mobile subscription | |
KR102163676B1 (en) | Method for Multi Authentication by using One Time Division Code | |
CN116056185B (en) | Wi-Fi network connection method, electronic equipment and Wi-Fi network connection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALIBABA GROUP HOLDING LIMITED, CAYMAN ISLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIAO, HUI;LI, JING;ZHOU, FAN;SIGNING DATES FROM 20200423 TO 20200515;REEL/FRAME:052841/0632 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD., CAYMAN ISLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALIBABA GROUP HOLDING LIMITED;REEL/FRAME:053702/0392 Effective date: 20200826 |
|
AS | Assignment |
Owner name: ADVANCED NEW TECHNOLOGIES CO., LTD., CAYMAN ISLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD.;REEL/FRAME:053796/0281 Effective date: 20200910 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |